US5155725A - Adaptive token release mechanism for ring networks - Google Patents
Adaptive token release mechanism for ring networks Download PDFInfo
- Publication number
- US5155725A US5155725A US07/637,183 US63718391A US5155725A US 5155725 A US5155725 A US 5155725A US 63718391 A US63718391 A US 63718391A US 5155725 A US5155725 A US 5155725A
- Authority
- US
- United States
- Prior art keywords
- token
- station
- stations
- ring
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/427—Loop networks with decentralised control
- H04L12/433—Loop networks with decentralised control with asynchronous transmission, e.g. token ring, register insertion
Definitions
- This invention relates to digital transmission systems and, more particularly, to improved token ring transmission systems.
- High speed token ring networks are often used to interconnect high performance computers and peripheral equipment. Such rings can also be used as a backbone transmission facility to interconnect local area networks (LANs).
- a token ring is a closed ring configuration in which a special frame, called the "token,” is circulated and used to control access of multiple stations on the ring to the ring transmission facility.
- the protocol allows a newly active station to seize the transmission facility when the token is received at that station. The active station then transmits the data originated at that station and intended for another station on the ring.
- no station is allowed to hold the token longer than a specific amount of time, called the token holding time (THT).
- THT token holding time
- the transmitting station must relinquish the token to allow other stations to seize the token and transmit their own data.
- the requirement to relinquish the token results in an idle period while the token circulates around the ring looking for another newly active station when no such newly active station exists.
- This idle period equal to the latency time of the ring, limits the overall throughput of the the ring network and thus reduces the efficiency of the network.
- the shorter the token holding time in order to support larger numbers of users, support real-time applications, or merely to provide better sharing of the transmission facility), the larger the inefficiency.
- status information about each station on a token ring network is shared with other stations on the ring in order to allow each station to determine whether or not to release the token or to continue to hold the token for another token holding period.
- Such status information can include the size of the transmission queue, the type of traffic to be transmitted, traffic priority, and so forth.
- This status information can be transmitted by means of a control frame or, preferably, by means of specific bits in the frame header or tailer.
- an active station can determine whether there is any other active station on the ring. If the token-holding station realizes that it is the only active station and no other station in the ring is waiting for the token, then the active station keeps transmitting data. If another active station is detected, the token is released for the use of the other active station.
- the next data frame includes a request for permission (RFP) to continue transmitting.
- RFP request for permission
- This request for permission message circulates around the ring while the token-holding station continues to transmit data. If there is another station or stations waiting for the token, the waiting station changes the request for permission message to a permission denied (PD) message, possibly simply by modifying the request for permission message. If the request for permission message circulates around the ring and back to the token-holding station without a permission denied message being inserted, then the token-holding station initiates a new token holding period and continues transmitting data, thus avoiding any idle time waiting for a token to circulate around the ring. If a permission denied message is received, the token-holding station completes the transmission of current frame and then releases the token for the use of the other active station.
- PD permission denied
- the token release mechanism of the present invention is termed "adaptive" since the decision of whether or not to release the token is adapted to the actual traffic demands of the stations on the ring rather than absolute, independent of the actual traffic demands of the other stations on the ring, as in the prior art token release mechanisms.
- Such adaptation of the token release action totally removes the idle period during which an unused token is circulated around the ring, and thus removes this major source of ring inefficiency.
- the adaptive token release procedure of the present invention can support various kinds of priority. For example, a higher priority data source can be allowed to insert a permission denied message, while a lower priority data source can be prohibited from inserting a permission denied message.
- Another type of priority called "relative" priority, can be implemented by assigning each station a different token holding period, the longer token holding periods being assigned to the higher priority stations.
- absolute and relative priority can be mixed in a single system, for example, if absolute priority is required for synchronous traffic such as voice or video traffic, while relative priority is desired for difference sources of bursty asynchronous traffic.
- FIG. 1 shows a block diagram of a generic form of token ring network in which the adaptive token release technique of the present invention might find use;
- FIG. 2 shows a graphical representation of a typical data frame circulated around the token ring network of FIG. 1, and which incorporates a control field for implementing the adaptive token release technique of the present invention
- FIG. 3 shows a graphical representation of the control field of the data frame illustrated in FIG. 2 showing the "request for permission” message, the "permission denied” message, and the priority bits for implementing the adaptive token release technique of the present invention
- FIG. 4 shows a flow chart of the procedure which takes place in the token-holding station of the ring network of FIG. 1 in order to implement the adaptive token release mechanism of the present invention
- FIG. 5 shows a flowchart of the procedure which takes place in all of the non-token-holding stations of the ring network of FIG. 1 in order to implement the adaptive token release mechanism of the present invention.
- FIG. 1 there is shown a general block diagram of a token ring network comprising a plurality of stations 10-16 interconnected by a transmission line loop or ring.
- the transmission network of FIG. 1 is arranged to transmit frames of digital data around the ring from a source station to a destination station.
- a special data frame called the "token”
- the first station wishing to transmit data detects the token on the ring, seizes the ring and substitutes station-originated data for the token frame. This actively transmitting station is called the token-holding station.
- the token-holding station continues to transmit data frames until all available data frames are transmitted, or until a token holding period times out.
- the purpose of the token holding period is to prevent one station from monopolizing the ring transmission facility to the exclusion of all other stations. If the token-holding station allows other stations to use the ring at the end of the token-holding period, the ring transmission facility can be shared among the different stations on the ring. In the prior art, the token-holding station merely gave up the token, i.e., ceased transmitting data and transmitted the token frame to allow other stations to seize the transmission facility. While this procedure insures sharing of the transmission facility when more than one station wishes to transmit data, it is extremely wasteful if only the one station is active.
- the time it takes to circulate the token frame around the ring, the ring delay or latency period, is entirely wasted since no data is being transmitted during this latency period, even though the original token-holding station may still wish to transmit data.
- the larger the ring the higher the likelihood of many more stations on the ring.
- the more stations on the ring the shorter the token holding period should be in order to permit fair sharing of the transmission facility.
- a shorter holding period also increases the inefficiency of the transmission facility since token frames must circulate in the ring more frequently.
- a different protocol or strategy is used to insure sharing of the ring transmission facilities.
- the stations are allowed to share information concerning their need for the transmission facility with the other stations.
- the information shared may be the status of the transmission queue (is any data waiting for transmission), the priority of the waiting traffic, or the type of signals to be transmitted.
- the sharing of this information allows the token sharing procedure to be adaptive to the actual state of the traffic demands on the system and no transmission time is wasted in polling the stations for activity by an unused token frame.
- FIG. 2 there is shown a graphical representation of a typical frame of data transmitted on the ring network of FIG. 1.
- the data frame of FIG. 2 comprises a start code 20 which is a unique code which marks the beginning of the data frame and allows all of the stations to receive the data synchronously.
- the second field of the data frame of FIG. 2 comprises a control field 21 which contains supervisory information indicating various control information concerning the frame of data. This control field 21 will be considered in more detail in connection with FIG. 3.
- the data packet of FIG. 2 also includes a destination address field 22 which is used to signal the appropriate destination station that the data frame is intended for that destination station.
- a source address field 23 is also included to advise the destination station where the data frame originated and to allow the originating station to remove the frame from the ring.
- a plurality of data words 24 follow which contain the substance of the information to be transmitted from the source station to the destination station.
- a check code field 25 contains information permitting the receiving station to detect and/or correct errors occurring in the data 24.
- a stop code field 26 contains another unique code allowing all stations to unambiguously recognize the end of the data frame or packet.
- the control field format of FIG. 3 comprises a request for permission (RFP) bit 30 which is set to a "1" if the token-holding station has timed out the token holding period and wishes to ascertain if it can continue transmitting data or must give up the token to another station.
- RTP request for permission
- the request for permission code is a single bit which is set to a "1.”
- many other codes and code values can be used to signal the other stations that the token-holding period has ended.
- the first station receiving the request for permission code and which has data available to be transmitted sets the permission denied bit 34 to "1."
- the token-holding station receives its data frame with the RFP bit set to "1,” it examines the PD bit. If the PD bit is "0,” the token-holding station can continue to transmit data frames. If the PD bit has been set to "1,” the token-holding station releases the token.
- the PD bit may be set based on information included in priority bits 31, frame type 32 and in the other control bits 33.
- PD bit 34 may be included in the frame end code 26 (FIG. 2) rather than in the control field 21 of the frame header.
- a "0" in the RFP bit position is a permission denied (PD) code. Since all subsequent stations will then see the "0" in the RFP position, only the first will be able to respond.
- the RFP bit is examined to determine if it has been changed to "0" (in which case the token must be given up) or remains a "1" (in which case the token-holding station can continue to transmit).
- the control field format of FIG. 3 also includes a priority bit subfield 31 in which bits are reserved to indicate the relative priority of the data in that data frame. As will be discussed hereafter, these priority bits can be used to further determine whether or not the token must be given up by the currently active token-holding station. If, for example, the priority of the token-holding traffic is higher than the priority of the newly active station, the newly active station is not permitted to deny the token-holding station permission to continue. On the other hand, if the priority of the newly active station is higher than the priority of the token-holding station, the token-holding station will be forced to release the token in favor of the higher priority station.
- the next subfield of the control field of FIG. 3 is frame type subfield 32.
- Frames may be of several different types including the token frame, data frames and supervisory frames.
- the token frame is the frame that circulates in the absence of any station traffic on the ring.
- a data frame is a frame containing data words from one station and destined for another station.
- Data frames may include synchronous data such as voice or video, or may include asynchronous data such as computer-to-computer exchanges.
- Supervisory frames include supervisory information such as that used for monitoring and maintaining the ring or for identifying failed stations.
- the subfield 33 of the control field of FIG. 3 contains any other control information which the users of the token ring may wish to include.
- the final subfield 34 of the control field is the PD bit 34.
- the signal formats of FIGS. 2 and 3 are merely illustrative and should not be taken as limiting. Such signal formats can have many different formats without changing the substance of the present invention. It is only necessary that the signal format include some mechanism, possibly no more than a single bit, for indicating to a token-holding station the relative activity status of the other stations on the ring. It is this status indication which allows the token-holding station to respond adaptively to the activity status of the ring and not give up the token when no other stations require the token.
- FIG. 4 there is shown a detail flowchart of the operation of the token-holding, active station on the ring of FIG. 1.
- the station receives the token in box 41, indicating that this station has the right to access the ring.
- the token holding timer THT
- Decision box 43 is then entered to determine if the transmission queue contains data to be transmitted. If not, box 52 is entered to release the token and the process terminated in terminal box 53. If there is data in the transmission queue, as determined by decision box 43, box 44 is entered in which a data frame is transmitted on the ring. Thereafter decision box 45 is entered to determine if the token holding period has expired.
- decision box 43 is re-entered to transmit any frames remaining in the transmission queue. If the token holding period has expired, as determined by decision box 45, decision box 46 is entered where it is determined whether or not the transmission queue has any frames for transmission. If not, box 52 is entered to release the token and the process terminated in box 53.
- box 47 is entered to send the request for permission to continue transmitting data.
- sending the request for permission code merely requires setting the RFP bit to "1" in the header of an otherwise normal data frame.
- box 48 this modified data frame is transmitted on the ring and thereafter decision box 49 is entered.
- decision box 49 the transmission queue is again checked and, if empty, the token is released in box 52 and the process terminated in box 53. If the transmission queue is found not to be empty in decision box 49, decision box 50 is entered to determine if the request for permission code has been received, indicating that the token-holding station can continue to transmit. If so, the token holding time is restarted in box 42 and the entire process reiterated.
- decision box 51 is entered to determine if the permission denied (PD) code has been received. If the PD code has been received, box 52 is entered to release the token and the process terminated in box 53. If the PD code has not been received, as determined by box 51, box 48 is re-entered to transmit the next data frame. The loop including boxes 48, 49, 50 and 51 is continually traversed until either the RFP code or the PD code is received. Thereafter, either the token is released (PD received) or the entire procedure of FIG. 4 restarted (RFP received).
- PD permission denied
- Dashed box 54 is shown in the feedback loop from decision box 50 to box 42.
- TTR timed token rotation
- stations define a target token rotation time (TTRT) in which each station is guaranteed to receive the token periodically within, at most, twice the TTRT.
- This protocol is used to transmit synchronous traffic (e.g., voice and video) as well as asynchronous traffic (e.g., computer data).
- Synchronous frames if present, are transmitted whenever a token is received.
- Asynchronous frames if present, are transmitted only if the token is received early, i.e., less than TTRT.
- the late counter is incremented every TTRT seconds and is reset when the token is received. If the LC is incremented twice before the token is received, the station assumes that the token is lost (since the protocol guarantees that the token will be received before this time, i.e., 2 ⁇ TTRT). The station therefore initiates a ring recovery procedure, interrupting any traffic on the ring.
- the adaptive sharing mechanism of the present invention allows the token-holding station to continue to use the token for another THT period if no other station is waiting for the token, it therefore must be able to reset the LC counters at all of the other stations to prevent these stations from initiating a ring recovery procedure.
- This reset message can be included in the other control bit subfield 33. It is necessary to reset the late counters (LCs) before the token can be passed to that station. In that case, box 54 is used to send a "reset timer" (RST) message to reset the late counters of all of the other stations in a TTR ring.
- RST reset timer
- the adaptive token release mechanism of the present invention operates precisely the same on a TTR ring as on a standard token ring.
- the procedure of the present invention is called adaptive and does not require the loss of an entire ring delay period every token holding period in order to transmit the token around the ring.
- FIG. 5 there is show a flowchart of the procedure which takes place in all of the stations of the ring of FIG. 1 which are not holding the token and hence not actively transmitting data.
- box 61 is entered to await the receipt of the RFP code.
- decision box 62 is entered in which it is determined if the transmission queue of this station has any data ready for transmission. If not, the procedure terminates at exit box 65. If there is data ready for transmission, decision box 63 is entered to determine if the priority of this station is equal to or greater than the priority of the data frame containing the RFP code. If not, the procedure again terminates in exit box 65. If the priority of the data to be transmitted from this station is equal to or greater than the priority of the received data frame, box 64 is entered to send the permission denied (PD) code. Thereafter the procedure is terminated in box 65.
- PD permission denied
- the priority scheme described above can be called absolute priority.
- Another type of priority is called relative priority.
- each data transmission is assigned a different token holding time, the higher priority traffic receiving the longer holding time. In this way, the total time available for transmission on the ring will be divided between the stations in proportion to their holding times and hence their relative priorities.
- the adaptive token release mechanism of the present invention does not interfere with such relative priority and, indeed, makes relative priorities more efficient by eliminating the token circulation time after each token holding period. Relative priority and absolute priority can be mixed in a single system to achieve the performance objectives of the system designers.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (12)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US07/637,183 US5155725A (en) | 1991-01-03 | 1991-01-03 | Adaptive token release mechanism for ring networks |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US07/637,183 US5155725A (en) | 1991-01-03 | 1991-01-03 | Adaptive token release mechanism for ring networks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US5155725A true US5155725A (en) | 1992-10-13 |
Family
ID=24554911
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US07/637,183 Expired - Lifetime US5155725A (en) | 1991-01-03 | 1991-01-03 | Adaptive token release mechanism for ring networks |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US5155725A (en) |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5311513A (en) * | 1992-09-10 | 1994-05-10 | International Business Machines Corp. | Rate-based congestion control in packet communications networks |
| US5313466A (en) * | 1992-09-22 | 1994-05-17 | The Texas A&M University System | Local synchronous bandwidth allocation in a token ring network |
| US5381413A (en) * | 1992-12-28 | 1995-01-10 | Starlight Networks | Data throttling system for a communications network |
| US5467352A (en) * | 1994-02-07 | 1995-11-14 | International Business Machines Corporation | Method and apparatus for improved throughput in a multi-node communication system with a shared resource |
| US5481676A (en) * | 1993-07-09 | 1996-01-02 | Siemens Aktiengesellschaft | Arrangement for the decentralized control of access to a bus by units connected to the bus |
| US5490145A (en) * | 1993-05-25 | 1996-02-06 | Matsushita Electric Industrial Company, Ltd. | Communication system for a ring-type network |
| US5515537A (en) * | 1993-06-01 | 1996-05-07 | The United States Of America As Represented By The Secretary Of The Navy | Real-time distributed data base locking manager |
| US5603012A (en) * | 1992-06-30 | 1997-02-11 | Discovision Associates | Start code detector |
| US5784648A (en) * | 1995-12-01 | 1998-07-21 | Apple Computer, Inc. | Token style arbitration on a serial bus by passing an unrequested bus grand signal and returning the token by a token refusal signal |
| US6041383A (en) * | 1996-07-22 | 2000-03-21 | Cabletron Systems, Inc. | Establishing control of lock token for shared objects upon approval messages from all other processes |
| US20020126661A1 (en) * | 2001-03-12 | 2002-09-12 | Ngai Henry P. | Dual-loop bus-based network switch using distance-value or bit-mask |
| US20040093602A1 (en) * | 2002-11-12 | 2004-05-13 | Huston Larry B. | Method and apparatus for serialized mutual exclusion |
| US20090043946A1 (en) * | 2007-08-09 | 2009-02-12 | Webb Randall K | Architecture for very large capacity solid state memory systems |
| US20090097419A1 (en) * | 2006-06-26 | 2009-04-16 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US20110289537A1 (en) * | 2010-05-24 | 2011-11-24 | Joe Buehl | Temporary authorization for a user device to remotely access a video on-demand service |
| US20140105081A1 (en) * | 2011-07-19 | 2014-04-17 | Denso Corporation | Communication network system |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US3796992A (en) * | 1971-12-27 | 1974-03-12 | Hitachi Ltd | Priority level discriminating apparatus |
| USRE28811E (en) * | 1970-10-08 | 1976-05-11 | Bell Telephone Laboratories, Incorporated | Interconnected loop data block transmission system |
| US4566097A (en) * | 1983-12-23 | 1986-01-21 | International Business Machines Corp. | Token ring with secondary transmit opportunities |
| US4675671A (en) * | 1983-12-28 | 1987-06-23 | Hitachi, Ltd. | Loop network system |
| US4682324A (en) * | 1985-10-11 | 1987-07-21 | General Electric Company | Implicit preemptive lan |
| US4933935A (en) * | 1984-07-13 | 1990-06-12 | British Telecommunications Plc | Communications systems |
| US5051986A (en) * | 1989-12-01 | 1991-09-24 | National Semiconductor Corporation | Asynchronous priority select logic |
| US5068849A (en) * | 1989-03-09 | 1991-11-26 | Mitsubishi Denki Kabushiki Kaisha | Cyclic data transmission method |
-
1991
- 1991-01-03 US US07/637,183 patent/US5155725A/en not_active Expired - Lifetime
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| USRE28811E (en) * | 1970-10-08 | 1976-05-11 | Bell Telephone Laboratories, Incorporated | Interconnected loop data block transmission system |
| US3796992A (en) * | 1971-12-27 | 1974-03-12 | Hitachi Ltd | Priority level discriminating apparatus |
| US4566097A (en) * | 1983-12-23 | 1986-01-21 | International Business Machines Corp. | Token ring with secondary transmit opportunities |
| US4675671A (en) * | 1983-12-28 | 1987-06-23 | Hitachi, Ltd. | Loop network system |
| US4933935A (en) * | 1984-07-13 | 1990-06-12 | British Telecommunications Plc | Communications systems |
| US4682324A (en) * | 1985-10-11 | 1987-07-21 | General Electric Company | Implicit preemptive lan |
| US5068849A (en) * | 1989-03-09 | 1991-11-26 | Mitsubishi Denki Kabushiki Kaisha | Cyclic data transmission method |
| US5051986A (en) * | 1989-12-01 | 1991-09-24 | National Semiconductor Corporation | Asynchronous priority select logic |
Cited By (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5603012A (en) * | 1992-06-30 | 1997-02-11 | Discovision Associates | Start code detector |
| US5311513A (en) * | 1992-09-10 | 1994-05-10 | International Business Machines Corp. | Rate-based congestion control in packet communications networks |
| US5313466A (en) * | 1992-09-22 | 1994-05-17 | The Texas A&M University System | Local synchronous bandwidth allocation in a token ring network |
| US5381413A (en) * | 1992-12-28 | 1995-01-10 | Starlight Networks | Data throttling system for a communications network |
| US5490145A (en) * | 1993-05-25 | 1996-02-06 | Matsushita Electric Industrial Company, Ltd. | Communication system for a ring-type network |
| US5515537A (en) * | 1993-06-01 | 1996-05-07 | The United States Of America As Represented By The Secretary Of The Navy | Real-time distributed data base locking manager |
| US5481676A (en) * | 1993-07-09 | 1996-01-02 | Siemens Aktiengesellschaft | Arrangement for the decentralized control of access to a bus by units connected to the bus |
| EP0666666A3 (en) * | 1994-02-07 | 2003-01-02 | International Business Machines Corporation | Method and apparatus for improved throughput in a multi-node communication system with a shared resource |
| US5572526A (en) * | 1994-02-07 | 1996-11-05 | International Business Machines Corporation | Method and apparatus for improved throughput in a multi-node communication system with a shared resource |
| US5467352A (en) * | 1994-02-07 | 1995-11-14 | International Business Machines Corporation | Method and apparatus for improved throughput in a multi-node communication system with a shared resource |
| US5784648A (en) * | 1995-12-01 | 1998-07-21 | Apple Computer, Inc. | Token style arbitration on a serial bus by passing an unrequested bus grand signal and returning the token by a token refusal signal |
| US6041383A (en) * | 1996-07-22 | 2000-03-21 | Cabletron Systems, Inc. | Establishing control of lock token for shared objects upon approval messages from all other processes |
| US20020126661A1 (en) * | 2001-03-12 | 2002-09-12 | Ngai Henry P. | Dual-loop bus-based network switch using distance-value or bit-mask |
| US6891828B2 (en) | 2001-03-12 | 2005-05-10 | Network Excellence For Enterprises Corp. | Dual-loop bus-based network switch using distance-value or bit-mask |
| US20040093602A1 (en) * | 2002-11-12 | 2004-05-13 | Huston Larry B. | Method and apparatus for serialized mutual exclusion |
| US7831974B2 (en) | 2002-11-12 | 2010-11-09 | Intel Corporation | Method and apparatus for serialized mutual exclusion |
| US20090097419A1 (en) * | 2006-06-26 | 2009-04-16 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US20100214962A1 (en) * | 2006-06-26 | 2010-08-26 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US20100217791A1 (en) * | 2006-06-26 | 2010-08-26 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US8213455B2 (en) * | 2006-06-26 | 2012-07-03 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US8351459B2 (en) * | 2006-06-26 | 2013-01-08 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US8687647B2 (en) * | 2006-06-26 | 2014-04-01 | Mitsubishi Electric Corporation | Communication node, and token issuing method and token-ring communication method in ring communication system |
| US20090043946A1 (en) * | 2007-08-09 | 2009-02-12 | Webb Randall K | Architecture for very large capacity solid state memory systems |
| US20110289537A1 (en) * | 2010-05-24 | 2011-11-24 | Joe Buehl | Temporary authorization for a user device to remotely access a video on-demand service |
| WO2011148303A3 (en) * | 2010-05-24 | 2012-01-12 | Ericsson Television Inc. | Temporary authorization for a user device to remotely access a video on-demand service |
| US20140105081A1 (en) * | 2011-07-19 | 2014-04-17 | Denso Corporation | Communication network system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US5155725A (en) | Adaptive token release mechanism for ring networks | |
| US4404557A (en) | Timed token ring with multiple priorities | |
| US4445116A (en) | Method for allocating bandwidth between stations in a local area network | |
| US4593280A (en) | Write token regeneration in a timed token ring | |
| US4454508A (en) | Timed token ring | |
| US4459588A (en) | Timed token protocol for local area networks | |
| US4538147A (en) | Bandwidth allocation in a token controlled loop communications network | |
| US5960001A (en) | Apparatus and method for guaranteeing isochronous data flow on a CSMA/CD network | |
| EP0422914B1 (en) | Station-to-station full duplex communication in a communications network | |
| US4987571A (en) | Data communication system with prioritized periodic and aperiodic messages | |
| US5935218A (en) | Method and apparatus for bus network prioritization using the broadcast of delay time to lower priority users from high priority users in a token or loop network | |
| US7248601B2 (en) | Method of allocating bandwidth on request to the stations of a local area network | |
| JP2002520950A (en) | Middleware-based real-time communication system | |
| US7130927B2 (en) | Method of bandwidth management between the stations of a local area network | |
| KR100232237B1 (en) | Lan interfacing apparatus and method | |
| JPH07110010B2 (en) | Information transmission method | |
| US5383186A (en) | Apparatus and method for synchronous traffic bandwidth on a token ring network | |
| US7106695B2 (en) | Method of allocating bandwidth to the stations of a local area network | |
| US6178177B1 (en) | Data-processing network having non-deterministic access, but having deterministic access time | |
| JPH0795745B2 (en) | Token passing system | |
| JPH09247192A (en) | Real-time communication method | |
| JP3087695B2 (en) | COMMUNICATION TERMINAL, COMMUNICATION SYSTEM USING THE SAME, AND RECORDING MEDIUM CONTAINING COMMUNICATION CONTROL PROGRAM BY THE SYSTEM | |
| JP2615441B2 (en) | Distributed access method for ring network | |
| AU657176B2 (en) | Method and circuit for controlling access to an asynchronously oeprated network | |
| JPH0763162B2 (en) | Slot access method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: BELL COMMUNICATIONS RESEARCH, INC., 290 WEST MOUNT Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:KHALIL, KHALID M.;REEL/FRAME:005571/0007 Effective date: 19901227 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: CHANGE OF NAME;ASSIGNOR:BELL COMMUNICATIONS RESEARCH, INC.;REEL/FRAME:010263/0311 Effective date: 19990316 |
|
| FPAY | Fee payment |
Year of fee payment: 8 |
|
| FPAY | Fee payment |
Year of fee payment: 12 |
|
| AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT Free format text: SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:015886/0001 Effective date: 20050315 |
|
| AS | Assignment |
Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:019520/0174 Effective date: 20070629 Owner name: TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENT RIGHTS;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT;REEL/FRAME:019520/0174 Effective date: 20070629 |
|
| AS | Assignment |
Owner name: WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT, DEL Free format text: SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:019562/0309 Effective date: 20070629 Owner name: WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT,DELA Free format text: SECURITY AGREEMENT;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:019562/0309 Effective date: 20070629 |
|
| FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:022408/0410 Effective date: 20090220 Owner name: TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text: RELEASE OF SECURITY INTEREST;ASSIGNOR:WILMINGTON TRUST COMPANY;REEL/FRAME:022408/0410 Effective date: 20090220 |
|
| AS | Assignment |
Owner name: TELCORDIA LICENSING COMPANY LLC, NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA TECHNOLOGIES, INC.;REEL/FRAME:022878/0821 Effective date: 20090616 |
|
| AS | Assignment |
Owner name: TELCORDIA TECHNOLOGIES, INC.,NEW JERSEY Free format text: RELEASE;ASSIGNOR:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT;REEL/FRAME:024515/0622 Effective date: 20100430 Owner name: TELCORDIA TECHNOLOGIES, INC., NEW JERSEY Free format text: RELEASE;ASSIGNOR:WILMINGTON TRUST COMPANY, AS COLLATERAL AGENT;REEL/FRAME:024515/0622 Effective date: 20100430 |
|
| AS | Assignment |
Owner name: TTI INVENTIONS A LLC, DELAWARE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TELCORDIA LICENSING COMPANY, LLC;REEL/FRAME:027843/0205 Effective date: 20111102 |